학술논문

The Novel Protocol Uses Low Computational Complexity to Authenticate Edge Devices on Smart Grid Systems
Document Type
Conference
Source
2023 9th IEEE India International Conference on Power Electronics (IICPE) Power Electronics (IICPE), 2023 9th IEEE India International Conference on. :1-6 Nov, 2023
Subject
Components, Circuits, Devices and Systems
Power, Energy and Industry Applications
Performance evaluation
Ciphers
Protocols
Scalability
Authentication
Aerospace electronics
Grid computing
ELBC
Light weight protocol
Block cipher
Security
Edge device
Language
ISSN
2160-3170
Abstract
Grid computing has emerged as a powerful paradigm for harnessing distributed computing resources to solve complex problems. In grid computing, various devices across different administrative domains collaborate to provide computational power and storage capacity. Sensor agent devices have become the backbone of modern technological systems such as Internet of Things (IoT), smart homes, industrial automation, and autonomous vehicles. These devices collect and process real-time data from the surrounding environment, providing crucial insights for decision-making, monitoring, and control purposes. However, the performance of these devices depends on space complexity and time complexity. Achieving optimum performance in sensor agent devices requires a delicate balance between space complexity and time complexity. Reducing one complexity may increase the other, and vice versa. Light weight authentication device-based algorithms play a vital role in verifying the identity of devices and ensuring secure communication within the grid and that needs to satisfy complexity. These protocols verify the identity of devices and users, ensuring that only authorized entities can access and interact with the data. In this article, we will explore a new light weight authentication protocol based on a block cipher i.e ELBC (Extended Linear Block cipher algorithm). The new authentication protocols are easy to implement and deploy in any kind of environment. The algorithm divides the authentication message into blocks and encrypts them using matrix multiplication. By generating an invertible key matrix and applying encryption and decryption equations, the proposed algorithm ensures secure communication.